Mashable 02月06日
New browser syncjacking cyberattack lets hackers take over your computer via Chrome
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

网络安全公司SquareX揭示了一种新型网络攻击——浏览器同步劫持。攻击者诱骗用户下载伪装成实用工具的恶意Chrome扩展程序,该扩展程序在后台连接到攻击者预先设置的Google Workspace管理配置文件。用户在不知情的情况下同步浏览器数据时,会将密码、浏览历史和自动填充信息发送给攻击者。攻击者还能进一步利用恶意扩展修改网页内容,诱导用户下载恶意软件,从而获得对用户设备更深层次的控制,包括访问Google Drive、剪贴板、邮件以及完全控制用户的文件和设置,甚至能通过摄像头、麦克风等监视用户。

🔑**Chrome扩展是入口**:攻击始于用户下载伪装成实用工具的恶意Chrome扩展程序,这些扩展通常权限需求低,且表面上功能正常,以此迷惑用户。

🔄**同步是关键**:恶意扩展在后台连接到攻击者预先设置的Google Workspace管理配置文件。当用户被诱导同步浏览器数据时,如密码、浏览历史等,这些敏感信息将被发送到攻击者的配置文件。

💻**设备完全接管**:通过恶意下载,攻击者可以注入注册表项,利用Chrome的Native Messaging协议,在恶意扩展和本地应用程序之间建立连接,从而向用户设备发送命令,最终完全控制用户的文件、设置,甚至监控用户的摄像头、麦克风等。

Hackers have discovered a new way to remotely take control of your computer — all through the Google Chrome web browser.

A report from cybersecurity company SquareX lays out the new multifaceted cyberattack, which the firm has dubbed "browser syncjacking."

Chrome profile takeover

At the core of the attack is a social engineering element, as the malicious actor first must convince the user to download a Chrome extension. The Chrome extension is usually disguised as a helpful tool that can be downloaded via the official Chrome Store. It requires minimal permissions, further cementing its perceived legitimacy to the user. According to SquareX, the extension actually does usually work as advertised, in order to further disguise the source of the attack from the user.

Meanwhile, secretly in the background, the Chrome extension connects itself to a managed Google Workspace profile that the attacker has set up in advance. With the user now unknowingly signed into a managed profile, the attacker sends the user to a legitimate Google support page which is injected with modified content through the Chrome extension, telling the user they need to sync their profile.

When the user agrees to the sync, they unwittingly send all their local browser data, such as saved passwords, browsing history, and autofill information, to the hacker's managed profile. The hacker can then sign into this managed profile on their own device and access all that sensitive information.

Chrome browser takeover

The attack up to this point already provides the hacker with enough material to commit fraud and other illicit activities. However, browser syncjacking provides the hacker with the capability to go even further.

Using the teleconferencing platform Zoom as an example, SquareX explains that using the malicious Chrome extension, the attacker can send the victim to an official yet modified Zoom webpage that urges the user to install an update. However, the Zoom download that's provided is actually an executable file that installs a Chrome browser enrollment token from the hacker's Google Workspace.

After this occurs, the hacker then has access to additional capabilities and can gain access to the user's Google Drive, clipboard, emails, and more.

Device takeover

The browser syncjacking attack doesn't stop there. The hacker can take one further step in order to not just take over the victim's Chrome profile and Chrome browser, but also their entire device.

Through that same illicit download, such as the previously used Zoom update installer example, the attacker can inject a "registry entry to message native apps" by weaponizing Chrome’s Native Messaging protocol. By doing this, the attacker basically sets up a connection "between the malicious extension and the local binary." Basically, it creates a flow of information between the hacker's Chrome extension and your computer. Using this, the hacker can send commands to your device.

What can the hacker do from here? Pretty much anything they want. The attacker will have full access to the user's computer files and settings. They can create backdoors into the system. They can steal data such as passwords, cryptocurrency wallets, cookies, and more. In addition, they can track the user by controlling their webcam, take screenshots, record audio, and monitor everything input into the device.

As you can see, browser syncjacking is nearly completely unrecognizable as an attack to most users. For now, the most important thing you can do to protect yourself from such a cyberattack is to be aware of what you download and only install trusted Chrome extensions.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

浏览器同步劫持 Chrome扩展 网络安全
相关文章